SHTree: A Structural Encrypted Traffic Fingerprint Generation Method for Multiple Classification Tasks

In recent years, encrypted traffic classification has been found widespread applications in the field of cybersecurity. Its main challenge lies in accurately represent traffic when features are obscured due to encryption. To address this, researchers utilize fingerprint construction methods based on...

Full description

Saved in:
Bibliographic Details
Published in2024 IEEE Symposium on Computers and Communications (ISCC) pp. 1 - 7
Main Authors Ma, Minghao, Shi, Zhixin, Yin, Qilei, Zong, Yangyang
Format Conference Proceeding
LanguageEnglish
Published IEEE 26.06.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In recent years, encrypted traffic classification has been found widespread applications in the field of cybersecurity. Its main challenge lies in accurately represent traffic when features are obscured due to encryption. To address this, researchers utilize fingerprint construction methods based on statistical information or employ Deep Learning (DL) for traffic representation. However, in previous methods of feature selection, flat key-value pair features, or raw packet bytes are often used, ignoring the structured information embedded in packets and flows. Therefore, We propose a novel structured encrypted traffic fingerprint generation method called SHTree. It constructs traffic fingerprints using a set of tree-based structures to represent traffic, encapsulating structural features from the traffic, enhancing the representation of traffic. This enables it to adapt to various classification tasks through general feature selection. The experiments demonstrate that our method achieves comparable accuracy to state-of-the-art Large Language Models (LLMs), with an F1 score higher by 0.5% on specific tasks. Meanwhile, it outperforms by three orders of magnitude in classification speed. In unsupervised abnormal detection tasks, the True Positive Rate (TPR) exceeds 99%, while maintaining a False Positive Rate (FPR) of 0.5%.
AbstractList In recent years, encrypted traffic classification has been found widespread applications in the field of cybersecurity. Its main challenge lies in accurately represent traffic when features are obscured due to encryption. To address this, researchers utilize fingerprint construction methods based on statistical information or employ Deep Learning (DL) for traffic representation. However, in previous methods of feature selection, flat key-value pair features, or raw packet bytes are often used, ignoring the structured information embedded in packets and flows. Therefore, We propose a novel structured encrypted traffic fingerprint generation method called SHTree. It constructs traffic fingerprints using a set of tree-based structures to represent traffic, encapsulating structural features from the traffic, enhancing the representation of traffic. This enables it to adapt to various classification tasks through general feature selection. The experiments demonstrate that our method achieves comparable accuracy to state-of-the-art Large Language Models (LLMs), with an F1 score higher by 0.5% on specific tasks. Meanwhile, it outperforms by three orders of magnitude in classification speed. In unsupervised abnormal detection tasks, the True Positive Rate (TPR) exceeds 99%, while maintaining a False Positive Rate (FPR) of 0.5%.
Author Ma, Minghao
Yin, Qilei
Zong, Yangyang
Shi, Zhixin
Author_xml – sequence: 1
  givenname: Minghao
  surname: Ma
  fullname: Ma, Minghao
  email: maminghao@iie.ac.cn
  organization: Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China
– sequence: 2
  givenname: Zhixin
  surname: Shi
  fullname: Shi, Zhixin
  email: shizhixin@iie.ac.cn
  organization: Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China
– sequence: 3
  givenname: Qilei
  surname: Yin
  fullname: Yin, Qilei
  email: yinql@zgclab.edu.cn
  organization: Zhongguancun Laboratory,Beijing,China
– sequence: 4
  givenname: Yangyang
  surname: Zong
  fullname: Zong, Yangyang
  email: zongyangyang@iie.ac.cn
  organization: Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China
BookMark eNqFjr1OwzAUhQ2iUlvoGyBxX6DBP0mcdENRSxk6JXtlpdfUYJzo2hn69lQCZqYznO98Okt2F4aAjD0JngnB6-e3tmlKUWqVSS7zTHCtVCnlDVvVuq5UwVWRSyVv2UKWuVxrVdVztozxg3NeFVIvmG33HSFu4AXaRFOfJjIetqGny5jwBB0Za10POxfekUZyIcErBiST3BDggOk8nMAOBIfJJzd6hMabGN119IN0Jn7GBzazxkdc_eY9e9xtu2a_doh4vGq_DF2Of__VP_U3audMAw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISCC61673.2024.10733622
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9798350354232
EISSN 2642-7389
EndPage 7
ExternalDocumentID 10733622
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IPLJI
JC5
OCL
RIE
RIL
ID FETCH-ieee_primary_107336223
IEDL.DBID RIE
IngestDate Wed Nov 06 05:53:24 EST 2024
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-ieee_primary_107336223
ParticipantIDs ieee_primary_10733622
PublicationCentury 2000
PublicationDate 2024-June-26
PublicationDateYYYYMMDD 2024-06-26
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-June-26
  day: 26
PublicationDecade 2020
PublicationTitle 2024 IEEE Symposium on Computers and Communications (ISCC)
PublicationTitleAbbrev ISCC
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0008527
Score 4.6175685
Snippet In recent years, encrypted traffic classification has been found widespread applications in the field of cybersecurity. Its main challenge lies in accurately...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Accuracy
Computer security
Computers
Decision making
Deep learning
Encryption
Feature extraction
Fingerprint recognition
Large language models
Network Security
Network Traffic Classification
Telecommunication traffic
Traffic Fingerprint
Title SHTree: A Structural Encrypted Traffic Fingerprint Generation Method for Multiple Classification Tasks
URI https://ieeexplore.ieee.org/document/10733622
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT4NAEJ5oT3qp1hof1czBK0hZ2C3eTFOCJjQmYNJb04Xl0oQ2LT3or3dngfqIJh5INoQFJpOdmZ395huAu0KHQqIQymIeKyx9ZdYo97kVCMfzpGBZkFO9czzl0av3PPNnTbG6qYVRShnwmbJpaM7y81W2o1SZXuFE3udqi3sogqAu1tqb3ZHvigbANXSC-6dkPOZDLpjeA7qe3U791kTF-JCwC9P26zV0ZGnvKmln7z-IGf_9eyfQ_yzXw5e9IzqFA1X2oNv2a8Bm-fbg-Av54BkUSZRulHrAR0wMiSwRcOCkzDZvax2GovZiRC-BoUn8Uf6vwpqkmnSJsWk9jTrmxbgBJaLpsEnYo_qRdLFdbvswCCfpOLJIkvm6JreYt0Kwc-iUq1JdALqO4JIF0qXNo1owKWWWi2Gh7ShXjj-6hP6vr7j64_41HJFOCHDl8gF0tIzqRrv2St4alX4ApfCoWA
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT4NAEJ6YelAv1Vrjo-oevIKUhV3wZkgbqoWYFJPemi4slya0aelBf707C9RHNPFAsiEsMJnszOzsN98A3OUqFOI5lwZ1aG6oKzW8zGWGzy3HEZymfob1zlHMwlfnaepO62J1XQsjpdTgM2niUJ_lZ8t0i6kytcKRvM9WFndfBdYeq8q1dobXc21eQ7j6ln8_mgQB6zNO1S7Qdsxm8rc2KtqLDNsQN9-vwCMLc1sKM33_Qc347x88hu5nwR552bmiE9iTRQfaTccGUi_gDhx9oR88hXwSJmspH8gjmWgaWaTgIIMiXb-tVCBKlB9Dggky1Kk_zACWpKKpRm2SSDefJirqJVENSyS6xyaij6pHkvlmselCbzhIgtBASWarit5i1ghBz6BVLAt5DsS2OBPUFzZuH-WcCiHSjPdzZUmZtFzvArq_vuLyj_u3cBAm0Xg2HsXPV3CI-kH4lc160FLyymvl6Etxo9X7AZ0nq6M
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+IEEE+Symposium+on+Computers+and+Communications+%28ISCC%29&rft.atitle=SHTree%3A+A+Structural+Encrypted+Traffic+Fingerprint+Generation+Method+for+Multiple+Classification+Tasks&rft.au=Ma%2C+Minghao&rft.au=Shi%2C+Zhixin&rft.au=Yin%2C+Qilei&rft.au=Zong%2C+Yangyang&rft.date=2024-06-26&rft.pub=IEEE&rft.eissn=2642-7389&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FISCC61673.2024.10733622&rft.externalDocID=10733622